23,124 Hits in 6.6 sec

Empowering Users to Make Informed Permission Request Choices

Tilo Westermann, Ina Wechsung
2015 Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct - MobileHCI '15  
In this paper we present a concept for empowering users to make informed choices on whether to accept or deny push notification requests.  ...  To an extreme end, this can lead to information overload and result in technostress. On Apple's iOS, apps need to request permission to send notifications.  ...  However, this prompt doesn't allow for making an informed choice, as the permission request looks the same (except for the app's name) for every app (see Fig. 1 ) and doesn't give a hint on what kind  ... 
doi:10.1145/2786567.2794333 dblp:conf/mhci/WestermannW15 fatcat:nq2hfgqz5vgqngel3kjexalrsu

Collaborative privacy management for third-party applications in online social networks

Pauline Anthonysamy, Awais Rashid, James Walkerdine, Phil Greenwood, Georgios Larkou
2012 Proceedings of the 1st Workshop on Privacy and Security in Online Social Media - PSOSM '12  
In this paper, we propose an approach that makes all requests for private data from TPAs explicit and enables a user to exert fine-grained access control over what profile data can be accessed by individual  ...  This is particularly beneficial to novice users or those new to a particular TPA or an OSN.  ...  This work is supported by the UK Engineering and Physical Sciences Research Council (EPSRC) cross-disciplinary account: UDesignIt: Social Media, Social Good -Ultra-Large Scale Public Engagement Systems to  ... 
doi:10.1145/2185354.2185359 fatcat:antgwzujv5bcldh3l3hfic6bvm

Assessing the Relationship between Technical Affinity, Stress and Notifications on Smartphones

Tilo Westermann, Sebastian Möller, Ina Wechsung
2015 Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct - MobileHCI '15  
Permission requests for sending push notifications on iOS don't inform the user about the nature of notifications of this app, leaving the user to make a rather uninformed choice on whether to accept or  ...  We show that requests including explanations are significantly more likely to be accepted.  ...  Currently, users are not empowered to make informed choices on whether or not they would like to receive push notifications by an app.  ... 
doi:10.1145/2786567.2793684 dblp:conf/mhci/WestermannMW15 fatcat:e5zkd4g32ffi3dc7ycwykkmfla

Privacy by ReDesign: Alleviating Privacy Concerns for Third-Party Apps

Heng Xu, Na Wang, Jens Grossklags
2012 International Conference on Information Systems  
A heightened need for empowering user control for third-party apps arises due to the inability to monitor the data use by app providers within and outside of the social networking platform and the inherent  ...  Users' private information can be easily revealed by their and even their friends' use of apps.  ...  Acknowledgements The authors are grateful to the associate editor and reviewers for their constructive comments on the earlier version of this manuscript.  ... 
dblp:conf/icis/XuWG12 fatcat:rji742a3czf2bby6cf5ll7ec6u

Dynamically Regulating Mobile Application Permissions [article]

Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, Konstantin Beznosov
2018 Zenodo  
Current smartphone operating systems employ permission systems to regulate how apps access sensitive resources.  ...  We found that a significant portion of participants make contextual privacy decisions: when determining whether access to sensitive data is appropriate, they consider what they are doing on their phones  ...  Unfortunately, the granularity of the choice the user gets to make is either to allow an app to read all contacts or to read no contacts.  ... 
doi:10.5281/zenodo.3264735 fatcat:xnwdxobsknfsri6s3yvckjoviy

Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions

Na Wang, Bo Zhang, Bin Liu, Hongxia Jin
2015 Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI '15  
Our findings suggest that empowering users with control over information disclosure and enhancing their ads awareness before installation effectively help them make better privacy decisions, increase their  ...  Through a controlled online experiment with 447 Android phone users using their own devices, we investigated how empowering users with information-disclosure control and enhancing their ads awareness affect  ...  Even though the privacy interface in our study was only a mockup, we used Javascript to make it interactive (participants could actually click on it and make choices), which brought a sense of reality  ... 
doi:10.1145/2785830.2785845 dblp:conf/mhci/WangZLJ15 fatcat:vzn5lv67fzekhorcx5bpxalxbq

Usability versus privacy instead of usable privacy

Paul Gerber, Melanie Volkamer, Karen Renaud
2015 Computers & society  
The new implementation does not make it possible for users to make informed decisions (Google's term).  ...  Based on their own statement 6 in order to make it easier for the user to make an informed decision whether an app shall be installed or not.  ... 
doi:10.1145/2738210.2738214 fatcat:xsz2gp2qyzhyde7e34qp7vtqpe

Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences

Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner, Nathan Good, Jung-Wei Chen
2017 Symposium On Usable Privacy and Security  
However, if such decisions are made automatically, then feedback mechanisms are needed to empower users to both audit those decisions and correct any errors.  ...  The popular open-source Android mobile platform has used two general approaches to give users control over permissions. Initially, permissions were presented as an install-  ...  Part of the purpose of these permission systems is to inform and empower users to make appropriate decisions about which apps have access to which pieces of personal information. time ultimatum, or ask-on-install  ... 
dblp:conf/soups/TsaiWRRE0GC17 fatcat:g55hdxbeevbcbiml4dzvxs2y6a

The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions

Paul Gerber, Melanie Volkamer, Karen Renaud
2017 Journal of Information Security and Applications  
App developers might exploit the combination of human propensities and the design of the Android permission-granting interface to gain permission to access more information than they really need.  ...  Apps can, if granted permission, gather a vast amount of very personal and sensitive information.  ...  Instead of empowering the user with better tools to understand associated risks and make an informed decision, the abstract visualizations led to a situation where most of the users just counted checkmarks  ... 
doi:10.1016/j.jisa.2016.10.003 fatcat:3yal5ppe75bwzplgrtpulyrscu

Deploying Islandora as a Digital Repository Platform: a Multifaceted Experience at the University of Denver Libraries

Shea-Tinn Yeh, Fernando Reyes, Jeff Rynhart, Philip Bain
2016 D-Lib Magazine  
Setting up the correct permissions in Islandora requires thorough planning as all user permission settings appear on one long screen, making it easy to miss a task when the settings seem endless.  ...  We recommend that when an issue occurs it is vital to make verifying permission status the first action taken.  ... 
doi:10.1045/july2016-yeh fatcat:frlmujbtdrcyrn366okkdqhgaa

The effect of developer-specified explanations for permission requests on smartphone user behavior

Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman, David Wagner
2014 Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14  
These permission request dialogs include space for developers to optionally include strings of text to explain to the user why access to the resource is needed.  ...  Through an online survey of 772 smartphone users, we show that permission requests that include explanations are significantly more likely to be approved.  ...  Thanks to Rebecca Pottenger, Erika Chin, and Aimée Tabor for their support and feedback.  ... 
doi:10.1145/2556288.2557400 dblp:conf/chi/TanNTNTEW14 fatcat:b2f4ic7nnnbgdalbffkzxr3oly

Short paper

Drew Fisher, Leah Dorner, David Wagner
2012 Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12  
For instance, on the iPhone, when an application requests access to location information, the operating system asks the user whether to grant location access to this application.  ...  If it is possible to improve the accuracy rate further, this information could be used to relieve users of the cognitive burden of individually assigning location permissions for each application, allowing  ...  It is plausible that it may be possible to leverage this information to reduce the number of privacy decisions users make, to select sane defaults based on past choices, or to use other designs to reduce  ... 
doi:10.1145/2381934.2381945 dblp:conf/ccs/FisherDW12 fatcat:dnut5cixivfdno56xolbmnyms4

Action Control by Term Rewriting

Steve Barker, Clara Bertolissi, Maribel Fernández
2009 Electronical Notes in Theoretical Computer Science  
An e-collective is a group of agents that may act individually or in conjunction with other agents to satisfy a client's request to act.  ...  We address the problem of defining access control policies that may be used in the evaluation of requests made by client actors, in the course of e-trading, to perform actions on the resources maintained  ...  be combined to make collective decisions on access requests, and changes to policies will usually need to be performed autonomously.  ... 
doi:10.1016/j.entcs.2009.02.070 fatcat:glfbz6dqznci7ci66qkugoztle

Contextual Permission Models for Better Privacy Protection

Primal Wijesekera
2018 Zenodo  
We found that when the application requesting the permission is running invisibly to the user, they are more likely to deny applications access to protected resources.  ...  At least 80% of our participants would have preferred to prevent at least one permission request.  ...  One of the contributions of the new permission system is to empower users to make informed decisions so that they can better protect their own sensitive data.  ... 
doi:10.5281/zenodo.3264743 fatcat:6oeru7cp6vemhblacvwunqbfde

Can You Hear Me Now? Audio and Visual Interactions That Change App Choices

Shakthidhar Reddy Gopavaram, Omkar Bhide, L. Jean Camp
2020 Frontiers in Psychology  
Unnecessary and excessive permission requests, overuse of resources, information exfiltration, and risky apps are endemic.  ...  The results showed that people with both visual cues and audio feedback are more likely to make app choices that are inversely correlated with the resources requested by the app.  ...  These funders were not involved in the study design, collection, analysis, interpretation of data, the writing of this article or the decision to submit it for publication.  ... 
doi:10.3389/fpsyg.2020.02227 pmid:33178056 pmcid:PMC7593676 fatcat:uo4ezileozfjjkxtege7zvltde
« Previous Showing results 1 — 15 out of 23,124 results